Hire best-in-class Identity and Security consultants & experts

Our invite-only community connects the world’s top
Identity and Security specialists to projects that need execution, now.

Identity and Security is an important field in FinTech. This article provides a brief overview of identity management and how it applies to the banking sector.
Identity and Security is an important field in FinTech. This article provides a brief overview of identity management and how it applies to the banking sector. The article begins with a historical overview of identity management until modern times, when the three pillars of identity management were introduced:
The three pillars are physical identities (e.g. driver’s license), digital identities (e-mail address) and anonymity (heritage). It then discusses how these aspects play into the traditional banking system, as well as what implications they have for financial institutions today.

The first pillar, physical identities, can be used to verify someone’s identity in real life. For example a driver’s license or passport are forms of physical identity that can be used to identify one’s real-life self. Digital identities are more abstract and do not necessarily reflect the person’s real-life characteristics or behavior. This includes things like e-mail addresses, which are not always made public to identify someone in trusted systems. The third pillar is anonymity, or more specifically pseudonymity, which allows an individual to have multiple identities that can be chained together into a secure profile. This is important for matters of privacy and security, as the power of identification lies with the individual and not the system.

Identity management has been around since ancient times, starting with war. In regards to war, having a verifiable identity was important in order to know that each soldier who fought was actually a real person and not a spy (Figueiredo & Moraes). As society evolved, so did the forms of identity.

With advances in technological progress, people were able to move from physical objects as proof of identity to data representations stored on computers. With this transition came two problems: “how can you prove that you are the owner of an object?” and “how can you prove that you are yourself?”. It was not until the mid-1970s that engineers were able to solve these problems and create a secure identity management system (Identity Management).

These systems were used by companies to control their employees through creating an electronic database of employee information. This system can still be found in some companies today, such as banks and hospitals.

As society progressed, so did the technology for creating identity management systems. In the 1980s, companies were able to digitize their physical identities into digital representations. These digital representations are called “account identifiers”, which are identifiers that uniquely identify an account or an object on a computer system (Identity Management). Examples of this include a social security number or an email address. An account identifier can be used to indicate an object’s ownership, but not necessarily the owner.

In the mid-1990s, the concept of anonymous online identity began to grow in popularity due to people who used pseudonyms to protect themselves from social stigma. Pseudonyms combined with digital identity provided people with extra privacy while in a public forum. However this was not completely secure without a secure system for managing identities like access and auditing. The first major system for achieving this was X.509 certificates, which created a secure system through encrypting identities and giving them back a unique identifier (Pasquier). Public-key encryption is then used to protect the sender and receiver’s identities (Schneier). This technique was later adopted by companies such as SSL Certificates.

By the end of the 1990s, identity management was very sophisticated and companies were able to identify people based on a multitude of different identifiers. This led to the monitoring of employees through a system called “Identity Governance and Administration” (Figueiredo & Moraes). Identity management has changed significantly since its inception in ancient times, but it will continue to evolve as society changes.

The three pillars of identity management are physical identities, digital identities and anonymity. They all play an important role in the Internet, but their significance changes based on the system in which they are used. For example, when using the internet, digital identities are most useful for connecting an account to a person. However companies connect physical identities to accounts to link human behaviors with technological instruments and ultimately prove that a person is who he says he is (Pasquier). Anonymity is advancing our knowledge of identity management by allowing individuals to manage their digital identities without linking them to real-life personal information (Schneier).

Physical Identities can be obtained by accessing a physical object or by testing for physical attributes. Examples of physical identity include a driver’s license or passport. Digital identities are representations of a person’s real-life characteristics which are stored on the internet. An example of a digital identity is someone’s email address. Finally, anonymity allows an individual to have multiple identities that can be chained together into a secure profile.

When physical identities or digital identities are combined, the result is an anonymous user. Anonymous users can be created in the traditional banking system to allow for more anonymity through pseudonyms. The term pseudonyms is used because these users do not represent their true identity when creating a profile for their bank account. The creation of pseudonyms allows individuals to manage multiple accounts, each having different characteristics (Figueiredo & Moraes).

Identity management is becoming increasingly important as the number of devices that individuals use to access the internet and their personal data increases. Identity management allows a person to easily communicate with other devices and people through a single identifier. To manage all these devices, individuals are turning to Identity Management Systems (IMS). IMSs are systems that facilitate the creation of identity profiles, allowing users to have control over their personal information (Figueiredo & Moraes). This control allows an individual to stop a company from tracking his online behaviors, as well as prevents companies from giving out his personal information like his home address or social security number (Pasquier).

The three most common types of IMSs are: single sign-on (SSO), federated identity management (FIDM) and service-oriented identity management (SOIM). SSO uses a single identifier, such as your email address, to authenticate users to multiple systems. This single identifier is the same for all systems so there is less confusion by companies. FIDM defines a collaborative database which can be accessed by multiple organizations. This allows many companies to share information on a user without compromising any one company’s data. SOIM allows an organization to develop an internal application that is used throughout the company. This allows companies to more closely monitor their users in comparison to FIDM.

Identity management is a complex but necessary system that allows people to have ownership of their digital identities while still having security over their personal data. With the development of IMS, individuals will have more control over how they communicate with companies and other people on the internet.

Some individuals are concerned that IMSs and identity management will give governments greater control over the internet. They argue that by sharing personal information with IMS, governments can use this information to track people’s online activities (Pasquier). While this is possible in some cases, it does not mean that all identity management systems are doing this. There are many identity management tools that allow people to secure their identities by not sharing certain information with others. The best way to avoid this is to use a secure system for managing digital identities, such as X.509 certificates (Schneier).

Many people believe that IMS creates a two-tiered society where there is one class of internet user, who has ownership and control over their personal data and another class who does not (Figueiredo & Moraes). The truth is that even though an IMS will allow you to create profiles for financial institutions, it is not necessary for you to do this in order to have complete control over your data. An individual can have complete control over their data by not allowing companies and the government to access certain information about them. IMSs are designed to make this control easier by providing a way for individuals to manage their information in one place but it is ultimately the individual who has control over personal information.

Hire the best Identity and Security specialists in 2,900+ industries

Fintalent is the invite-only community for top-tier M&A consultants and Strategy talent. Hire global Identity and Security consultants with extensive experience in over 2,900 industries. Our platform allows you to build your team of independent Identity and Security specialists in 48 hours. Welcome to the future of Mergers & Acquisitions!

Why should you hire Identity and Security experts with Fintalent?

Trusted Network

Every Fintalent is exclusively invited and vetted.

Ready in 48h​​​

Hire efficiently. Your M&A team is ready in 2 days or less.​​​​

Specialized Skills​

Fintalents are best-in-class - and specialized in 2,900+ industries.​

Code of Ethics​​

We guarantee highest integrity and ethical principles.​​​

Selected Clients and Partners

Frequently asked questions

Most frequent questions and answers

What clients usually engage your Identity and Security Consultants?

We work with clients from all over the world. Our clients range from enterprise and corporate clients to companies that are backed by Private Equity or Venture Capital funds. Furthermore, we work directly with Family Offices, Private Equity firms, and Asset Managers. Most of our enterprise clients have dedicated Corporate Development, M&A, and Strategy divisions which are utilizing our pool of Identity and Security talent to add on-demand and flexible resources, expertise, or staff to their in-house team.

How is Fintalent different?

Fintalent is not a staffing agency. We are a community of best-in-class Identity and Security professionals, highly specialized within their domains. We have streamlined the process of engaging the best Identity and Security talent and are able to provide clients with Identity and Security professionals within 48 hours of first engaging them. We believe that our platform provides more value for Corporates, Ventures, Private Equity and Venture Capital firms, and Family Offices.

Our Hiring Process – What do ‘Community-Approach’ and ‘Invite-to-Apply’ mean?

‘Invite-to-Apply’ is the process by which we shortlist candidates for the majority of projects on our platform. Often, due to the confidential nature of our clients’ projects, we do not release projects to our whole platform but using the matching technology and expertise of our internal team we select candidates who are the best fit for our clients’ needs. This approach also ensures engagement with our community of professionals on the Fintalent platform, and is a benefit both to our clients and independent professionals, as our freelancers have direct access to the roles best suited to their skills and are more likely to take an interest in a project if they have been sought out directly. In addition, if a member of our community is unavailable for a project but knows someone whose skill set perfectly fits the brief, they are able to invite them to apply for the role, utilizing the personal networks of each talent on our platform.

Which skills and expertise do your Fintalents have?

The Fintalents are hand-picked and vetted Identity and Security professionals, speak over 55 languages, and have professional experience in all geographical markets. Our Identity and Security consultants’ experience ranges from 3+ years as analysts at top investment banks and Strategy consultancies, to later career C-level executives. The average working experience is 6.9 years and 80% of all Fintalents range from 3-12 years into their careers.

Our Identity and Security consultants have experience in leading firms as well as interfacing with clients and wider corporate structures and management. What makes our Identity and Security talent pool stand out is the fact that they have technical backgrounds in over 2,900 industries.

How does the screening and onboarding of your Identity and Security talent work?

Fintalent.io is an invite-only platform and we believe in the power of referrals and a closed-loop community. Members of our community are able to invite a small number of professionals onto the platform. In addition, our team actively scouts for the best talent who have experience in investment banking or have worked at a global top management consultancy. All of our community-referred talent and scouted talent are subject to a rigorous screening process. As such, over the last 18 months totaling more than 750 hours of onboarding calls, of which only 40% have received an invite-link after the call.

What happens if I am not satisfied with my Identity and Security consultant’s work?

During your initial engagement with a member of our Fintalent talent pool with no risk. If you are not satisfied with the quality of your hire for any reason then we are able to find a replacement at short notice. There is no minimum commitment per project, but generally projects last at least 5 days and can last 12+ months.

Interested in our invite-only community of tier-1 Identity and Security experts?

Cookie settings
Cookies are used on this website. These are needed for the operation of the website or help us to improve the website.
Allow all cookies
Save selection
Individual settings
Individual settings
This is an overview of all cookies used on the website. You have the option to make individual cookie settings. Give your consent to individual cookies or entire groups. Essential cookies cannot be disabled.
Save
Cancel
Essential (2)
Essential cookies are needed for the basic functionality of the website.
Show cookies